-
Notifications
You must be signed in to change notification settings - Fork 66
Description
Thanks for Portracker! It's a great tool!
I'm trying to deploy Portracker in a homelab setup and ran into a limitation around remote Docker hosts.
Current setup
Right now Portracker supports connecting to docker-socket-proxy:2375, which works over plain HTTP.
In my setup though, docker-socket-proxy is always behind HTTPS with mTLS:
- Port
2375is never exposed directly - It's reverse-proxied to something like:
https://<host>:63377 - Access requires CA + client cert + client key (mTLS)
This works fine for other tools, but Portracker currently has no way to pass TLS certs, so it can't connect.
Feature request
Would it be possible to add support for:
- Connecting to Docker API over HTTPS
- mTLS authentication (CA / cert / key)
- A
Dozzle-likeremote host syntax, which is super convenient at scale
Dozzle already supports this pretty nicely: https://dozzle.dev/guide/remote-hosts
Dozzle-style syntax
Dozzle allows defining multiple remote hosts via a single env var like this:
DOZZLE_REMOTE_HOST=tcp://<remote_host_1>:63377|<remote_host_1>,tcp://<remote_host_2>:63377|<remote_host_2>,tcp://<remote_host_3>:63377|<remote_host_3>,...Having something similar in Portracker would be huge for managing many hosts.
TLS / mTLS part
Ideally this would also support:
https://endpoints- shared or per-host:
- CA cert
- client cert
- client key
- loaded from file paths or env vars
This would:
- avoid exposing insecure Docker APIs
- remove the need for hacky downgrade proxies
- make Portracker usable in more serious / security-conscious setups
Happy to help test or share config examples if you're interested.